From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Solution: Enemybot

Solution: Enemybot

(upbeat electronic music) - [Instructor] Okay, now let's check our work. You were to read the article and then answer the questions. So first, what is Enemybot and how does it infect devices? Enemybot is a Mirai-based botnet malware that infects devices through vulnerabilities in modems, routers, and IoT devices. What makes mapping and taking down Enemybot's command and control server challenging? Well, Enemybot's command and control server convolutes, or obscures information and string values, and it hides behind Tor nodes to help conceal its location. What types of commands does Enemybot support? Well, Enemybot supports various commands, though they're mostly related to DDoS attacks, such as a DNS attack, which will flood DNS servers with hard-coded queries, or an HTTP attack, which will flood the target with HTTP requests. Which commands indicate possible extortion campaigns targeting specific companies? Well, a few of the identified commands were ARK. Now, this is to perform an…

Contents